Sciweavers

772 search results - page 6 / 155
» A Trust-Based Security Architecture for Ubiquitous Computing...
Sort
View
EGC
2005
Springer
14 years 1 months ago
M-Grid: Using Ubiquitous Web Technologies to Create a Computational Grid
Abstract. There are many potential users and uses for grid computing. However, the concept of sharing computing resources excites security concerns and, whilst being powerful and f...
Robert John Walters, Stephen Crouch
ATC
2006
Springer
13 years 11 months ago
Development and Runtime Support for Situation-Aware Security in Autonomic Computing
Abstract. To overcome increasing complexity and dynamic nature of distributed computing system, such as ubiquitous computing systems, it is critical to have computing systems that ...
Stephen S. Yau, Yisheng Yao, Min Yan
DAC
2004
ACM
14 years 8 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
FTDCS
2003
IEEE
14 years 1 months ago
Situation-Aware Contract Specification Language for Middleware for Ubiquitous Computing
Ubicomp applications are characterized as situationaware, frequently-and-ephemerally-communicated and QoS-properties-associated. Using middleware to provide multiple QoS support f...
Stephen S. Yau, Yu Wang, Dazhi Huang, Hoh Peter In
DEXAW
2005
IEEE
127views Database» more  DEXAW 2005»
14 years 1 months ago
A Key Establishment IP-Core for Ubiquitous Computing
A most critical and complex issue with regard to constrained devices in the ubiquitous and pervasive computing setting is secure key exchange. The restrictions motivate the invest...
Markus Volkmer, Sebastian Wallner